"Privacy isn't about hiding bad things, but about protecting what defines us as human beings, who we are. Our day-to-day behavior, our personality, our fears, our relationships, and our vulnerabilities."

-- The Tor Project


MAC addresses can be generated, OpenBSD has this built in for example.
(I think that's what you mean by 'Mac card').

You -> VPN -> Tor = that's linkable to you -> go to jail

Tor -> VPN -> Internet = Better, as it adds a layer. But you need to pay for the VPN somehow -> Back to square 1.

There are a couple of talks on this, but this one is a good one:


@Wolf480pl @d599f84e @fribbledom @vikramjeetsinghparmar

The reason I made this point is:

VPN offers privacy
Tor offers anonymity

If you connect through a VPN -> Tor to your target, you could have skipped the VPN Part. The situation would be as if you use Tor over your ISP. In case someone is able to tag traffice through tor back to your place you are bust.

If you use Tor to connect to a VPN, you add another layer between you and your adversary. The Traffic might be traced back to your VPN entry point but then one still has to correlate data back to you over Tor.

See the talk I have linked to previously (slides starting at page 95)

@opal @d599f84e @Wolf480pl @fribbledom

Please, show some manners or keep me out of your kindergarten.